Solved

Password protect folders in Windows

Posted on 2010-09-08
8
518 Views
Last Modified: 2013-12-04
I have a user who is using Novell ifolder to sync his files on his laptop. He is allowing an assistant to have a copy of his ifolder on their laptop, but he wants to password protect sensitive folders. How can I secure the sensitive folders within his ifolder that will be synced to her laptop?

I have found a solution to zip the folders and then password protect the zipped folders. I am not sure he would like this method. The other info I am finding is to Encrypt the folders, but this may be too extreme.

Any suggestions?
0
Comment
Question by:ILSI
  • 3
  • 3
  • 2
8 Comments
 
LVL 1

Expert Comment

by:Nexttime
ID: 33631679
The easiest way would be disabling other users in the security tab.
Right click on the sub folders/files that you would like not shared.
Right click and go to the security tab.
Remove permissions for everyone except Admins (assuming he is a admin of his own computer.)
0
 
LVL 2

Assisted Solution

by:heygar
heygar earned 125 total points
ID: 33631700
I'd go the Encryption route.  It's built into Windows so it should be transparent once it's setup (assuming the user's login credentials are the same on all his computers).

Only the user encrypting the folder will be able to access the folder which seems like what you want.

I tried the password zip route once and it got old real fast.  I had to download special software to attach the password and then unzipping large folders can be time consuming.
0
 
LVL 1

Assisted Solution

by:Nexttime
Nexttime earned 125 total points
ID: 33631731
If you go encryption and are using back ups you could loose your encryption key if you are backing up you encryption cert.
The password zip route is just to cumbersome it would seem to be practical. If it is a shared folder disabling security shares would stop unwanted people from accessing the files over the network without hindering your own use of them.
0
 

Author Comment

by:ILSI
ID: 33631818
The ifolder is not really an MS shared folder. It is similar to MS sync folders (I guess). The assistant has the ifolder client on their machine as well and is using their supervisors password to gain access to the ifolder (locally on their laptop). How is the encryption done?
0
Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

 
LVL 2

Expert Comment

by:heygar
ID: 33631986
I've never used iFolder, but if it's based on syncing between a local copy and a remote copy (which I believe it is) then once the local copy is encrypted, the encryption should sync with the remote copy (thus encrypting both copies).

I'd test it on something you don't mind losing first.  Just right-click on the local copy of the folder, choose properties, general tab, advanced, then encrypt.  Choose folder and subfolders when it asks and let it run.  

I'd intuitively guess that once it's encrypted and synced then no one will be able to read the contents of the encrypted folder except for the user that setup the encryption.
0
 

Author Comment

by:ILSI
ID: 33632060
That is what I figured. I tested this on my work computer, which has ifolder and then tried to access it on my personal laptop that also has the client and was still able to access the encrypted folder. do you think it is because I am logged on the ifolder with the same credentials?
0
 
LVL 2

Expert Comment

by:heygar
ID: 33632355
The way I understand Windows Encryption is that it encrypts based on the unique windows user id.
The way you are saying it works, it sounds like it's sending the unencrypted data to the iFolder which is too bad.  I don't think the iFolder credentials matter at that point.

I found this: http://forums.novell.com/novell-product-support-forums/ifolder/152949-ifolder-encryption.html
0
 

Accepted Solution

by:
ILSI earned 0 total points
ID: 33789067
The user decided to just move the sensitive data out of the ifolder. An option that was also given to him. Thanks guys for your insight.
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Article by: btan
Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
In this Micro Tutorial viewers will learn how to use Boot Corrector from Paragon Rescue Kit Free to identify and fix the boot problems of Windows 7/8/2012R2 etc. As an example is used Windows 2012R2 which lost its active partition flag (often happen…
The viewer will learn how to successfully create a multiboot device using the SARDU utility on Windows 7. Start the SARDU utility: Change the image directory to wherever you store your ISOs, this will prevent you from having 2 copies of an ISO wit…

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now